Vulnerability Details : CVE-2018-15890
An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server.
Exploit prediction scoring system (EPSS) score for CVE-2018-15890
Probability of exploitation activity in the next 30 days: 0.52%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 74 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-15890
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2018-15890
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-15890
-
https://github.com/frohoff/ysoserial/
GitHub - frohoff/ysoserial: A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.Exploit;Third Party Advisory
-
https://github.com/ethereum/ethereumj/issues/1161
Unsafe Java object serialization · Issue #1161 · ethereum/ethereumj · GitHubExploit;Issue Tracking;Third Party Advisory
-
https://github.com/ethereum/ethereumj
GitHub - ethereum/ethereumj: Java implementation of the Ethereum yellowpaper. For JSON-RPC and other client features check Ethereum HarmonyProduct
Products affected by CVE-2018-15890
- cpe:2.3:a:ethereum:ethereumj:1.8.2:*:*:*:*:*:*:*